General
-
Target
Untitled.png
-
Size
258KB
-
Sample
240720-wzef7axaql
-
MD5
25811860c5ee9a5d25be24c4bcaeb34a
-
SHA1
2c80b6e3c27ede1837e589ef67ecdb4da70fd5aa
-
SHA256
4932eefd4a7e0037008f10b3e45623cfb9cf54943b2f09e0762d7a0facd28298
-
SHA512
eb1910e1d3b68ce2aa49300a6f692f839813a1bd8aa8a34234a5c529f0d0530f1549b54727ee7b65a61be52c5b050132b3e06a0c85eb19382c0bf3745f70888f
-
SSDEEP
6144:jR/mp0+VMP4Dbk7GotugGS8yReMdBFhq61YQBjRWzq1XWdnyNA:jE/2f7Go1GS8GekBFhq6OaRIq1XWsa
Static task
static1
Behavioral task
behavioral1
Sample
Untitled.png
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
Untitled.png
-
Size
258KB
-
MD5
25811860c5ee9a5d25be24c4bcaeb34a
-
SHA1
2c80b6e3c27ede1837e589ef67ecdb4da70fd5aa
-
SHA256
4932eefd4a7e0037008f10b3e45623cfb9cf54943b2f09e0762d7a0facd28298
-
SHA512
eb1910e1d3b68ce2aa49300a6f692f839813a1bd8aa8a34234a5c529f0d0530f1549b54727ee7b65a61be52c5b050132b3e06a0c85eb19382c0bf3745f70888f
-
SSDEEP
6144:jR/mp0+VMP4Dbk7GotugGS8yReMdBFhq61YQBjRWzq1XWdnyNA:jE/2f7Go1GS8GekBFhq6OaRIq1XWsa
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3